Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map



 

Here   Top   Up   Prev   Next
1…      5…   6…   7…     

 

 

6  Solutions
6.1  Solution #1 S-GW/BBIFF based GTP tunnel extraction
6.1.1  Description
6.1.2  S-GW/BBIFF based GTP tunnel extraction architecture reference modelWord-p. 20
6.1.3  Process Flow for Architectural Approach of Solution #1
6.1.4  Call Flow for architectural approach of Solution #1Word-p. 24
6.1.5  Solution approach to key issuesWord-p. 25
6.1.5.1  Approach to key issue #1 - IMEI targeted LI
6.1.5.2  Approach to key issue #2 - Tel-URI or SIP-URI targeted LIUp
6.1.5.3  Approach to key issue #3 - LI targeted S8 GTP selection criteriaWord-p. 27
6.1.5.4  Approach to key issue #4 - Obtaining network provided locationWord-p. 28
6.1.5.5  Approach to key issue #5 - Intra-access handover or anchor change impact
6.1.5.6  Approach to key issue #6 - Detecting targeted signalling unknown or unrecognized by the VPLMNUp
6.1.5.7  Approach to key issue #7 - Maintaining intra-PLMN and inter-PLMN LI undetectability
6.1.5.8  Approach to key issue #8 -Detecting implicit IMS registrationsWord-p. 30
6.1.5.9  Approach to key issue #9 - Retained Data
6.1.5.10  Approach to key Issue # 10 - Prevention of unwanted use of confidentiality mechanisms
6.1.5.11  Approach to key Issue # 11 - Non-Local Identity
6.1.5.12  Approach to key issue #12 - Non-3GPP codec or 3GPP codec in a non-3GPP mode in CC
6.1.5.13  Approach to key issue #13 - Start of interception with ongoing VoLTE callWord-p. 31
6.1.5.14  Approach to key issue #14 - Correlation of CC with IRI
6.1.5.15  Approach to key issue #15 - Signalling Compression
6.1.6  Impacts on existing nodes and interfacesUp
6.2  Solution #2 - Enhanced Architecture
6.3  Solution #3 - Data forwarding from HPLMNWord-p. 40
6.4  Solution #4 Retained Data Solution supporting ETSI and VPLMN control requirementsWord-p. 43Up

Up   Top   ToC